Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Subjects(RVK)
  • 1
    UID:
    gbv_369168232
    Format: XVI, 192 Seiten , graph. Darst.
    ISBN: 354020105X
    Series Statement: Lecture notes in computer science 2815
    Additional Edition: Erscheint auch als Online-Ausgabe Lindell, Yehuda Composition of Secure Multi-Party Protocols Berlin, Heidelberg : Springer Berlin Heidelberg, 2003 ISBN 9783540201052
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Mehrparteienprotokoll ; Kryptologie ; Mehrparteienprotokoll ; Datensicherung ; Mehrparteienprotokoll
    URL: Cover
    Author information: Lindell, Yehuda 1971-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin Heidelberg,
    UID:
    almahu_9947920526502882
    Format: XVI, 200 p. , online resource.
    ISBN: 9783540398196
    Series Statement: Lecture Notes in Computer Science, 2815
    Content: In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.
    Note: 1. Introduction -- 2. The Composition of Authenticated Byzantine Agreement -- 3. Secure Computation without Agreement -- 4. Universally Composable Multi-party Computation.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540201052
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin Heidelberg :
    UID:
    almahu_9948621417002882
    Format: XVI, 200 p. , online resource.
    Edition: 1st ed. 2003.
    ISBN: 9783540398196
    Series Statement: Lecture Notes in Computer Science, 2815
    Content: In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.
    Note: 1. Introduction -- 2. The Composition of Authenticated Byzantine Agreement -- 3. Secure Computation without Agreement -- 4. Universally Composable Multi-party Computation.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662186596
    Additional Edition: Printed edition: ISBN 9783540201052
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540201502?
Did you mean 9783540061052?
Did you mean 9783540101055?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages